-
1
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crepeau and U.M. Maurer, “Generalized privacy amplification”, IEEE Transaction on Information Theory, Vol. 41, no. 6, November 1995, pp. 1915-1923.
-
(1995)
IEEE Transaction on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
2
-
-
0023985539
-
Privacy amplification by public discussion
-
C.H. Bennett, G. Brassard and J.-M. Robert, “Privacy amplification by public discussion”, SIAM Journal on Computing, Vol. 17, no. 2, April 1988, pp. 210-229.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
4
-
-
84888252697
-
All-or-nothing disclosure of secrets
-
Springer-Verlag
-
G. Brassard, C. Crepeau and J.-M. Robert, “All-or-nothing disclosure of secrets”, Advances in Cryptology: Proceedings of Crypto’86, Springer-Verlag, 1987, pp. 234-238.
-
(1987)
Advances in Cryptology: Proceedings of Crypto’86
, pp. 234-238
-
-
Brassard, G.1
Crepeau, C.2
Robert, J.-M.3
-
5
-
-
0030283655
-
Oblivious transfers and intersecting codes
-
G. Brassard, C. Crepeau and M. Santha, “Oblivious transfers and intersecting codes”, IEEE Transactions on Information Theory, Vol. 42, no. 6, November 1996, pp. 1769-1780.
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.6
, pp. 1769-1780
-
-
Brassard, G.1
Crepeau, C.2
Santha, M.3
-
7
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
J. L. Carter and M. N. Wegman, “New hash functions and their use in authentication and set equality”, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Carter, J.L.1
Wegman, M.N.2
-
9
-
-
0028550581
-
Intersecting codes and independent families
-
G. D. Cohen and G. Zemor, “Intersecting codes and independent families”, IEEE Transactions on Information Theory, Vol. 40, no. 6, November 1994, pp. 1872-1881.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, Issue.6
, pp. 1872-1881
-
-
Cohen, G.D.1
Zemor, G.2
-
10
-
-
21144445360
-
Verifiable disclosure of secrets and application
-
Springer-Verlag
-
C. Crepeau, “Verifiable disclosure of secrets and application”, Advances in Cryptology: Proceedings of Eurocrypt’89, Springer-Verlag, 1990, pp. 181-191.
-
(1990)
Advances in Cryptology: Proceedings of Eurocrypt’89
, pp. 181-191
-
-
Crepeau, C.1
-
12
-
-
84957649042
-
On the reversibility of oblivious transfer
-
Proceedings of Crypto’95, Springer-Verlag
-
C. Crepeau, J. van de Graaf and A. Tapp, “Committed oblivious transfer and private multi-party computations”, Advances in Cryptology: Proceedings of Crypto’95, Springer-Verlag, 1995, pp. 110-123.
-
(1991)
Committed oblivious transfer and private multi-party computations”, Advances in Cryptology
, pp. 110-123
-
-
Crepeau, C.1
van de Graaf, J.2
Tapp, A.3
-
14
-
-
21144435910
-
Efficient reductions among oblivious transfer protocols based on new self-intersecting codes
-
Springer-Verlag
-
C. Crepeau and M. Santha, “Efficient reductions among oblivious transfer protocols based on new self-intersecting codes”, Sequences II, Methods in Communications, Security and Computer Science, Springer-Verlag, 1991, pp. 360-368.
-
(1991)
Sequences II, Methods in Communications, Security and Computer Science
, pp. 360-368
-
-
Crepeau, C.1
Santha, M.2
-
15
-
-
0020878801
-
A randomized protocol for signing contracts
-
Plenum Press, New York
-
S. Even, O. Goldreich and A. Lempel, “A randomized protocol for signing contracts”, Proceedings of Crypto 82, Plenum Press, New York, 1983, pp. 205-210.
-
(1983)
Proceedings of Crypto 82
, pp. 205-210
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
16
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali and C. Rackoff, “The knowledge complexity of interactive proof-systems”, SIAM Journal on Computing, Vol. 18, 1989, pp. 186-208.
-
(1989)
SIAM Journal on Computing
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
18
-
-
0003462641
-
-
Technical Memo TR-81, Aiken Computation Laboratory, Harvard University
-
M. O. Rabin, “How to exchange secrets by oblivious transfer”, Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.O.1
-
21
-
-
0001998264
-
Conjugate coding
-
Original manuscript written circa 1970
-
S. Wiesner, “Conjugate coding”, Sigact News, Vol. 15, no. 1, 1983, pp. 78-88. Original manuscript written circa 1970.
-
(1983)
Sigact News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
|